Decontamination of an Arbitrary Network from Multiple Black Viruses
نویسندگان
چکیده
In networks supporting mobile agents, a particular threat is that posed by the presence of a black virus (BV), a harmful entity capable of destroying any arriving agent, and of spreading clones to neighbouring sites. A BV can only be destroyed if at the same site there is an anti-viral agent; but, if the BV is already active when encountering the agent, it spreads clones to all the neighbouring sites. The problem of locating and permanently eliminating all such harmful presences has been studied both in special classes of regular network topologies, and in networks of arbitrary and unknown topology; however, in all these studies, it was assumed that there was a single BV in the system. In this paper we consider the case of multiple BVs. We present fully distributed decontamination procedures that operate with no a priori knowledge of the network topology, nor of the number and location of the black viruses.
منابع مشابه
DALD:-Distributed-Asynchronous-Local-Decontamination Algorithm in Arbitrary Graphs
Network environments always can be invaded by intruder agents. In networks where nodes are performing some computations, intruder agents might contaminate some nodes. Therefore, problem of decontaminating a network infected by intruder agents is one of the major problems in these networks. In this paper, we present a distributed asynchronous local algorithm for decontaminating a network. In mos...
متن کاملA Review of Computation Solutions by Mobile Agents in an Unsafe Environment
Exploration in an unsafe environment is one of the major problems that can be seen as a basic block for many distributed mobile protocols. In such environment we consider that either the nodes (hosts) or the agents can pose some danger to the network. Two cases are considered. In the first case, the dangerous node is a called black hole, a node where incoming agents are trapped, and the problem...
متن کاملNetwork decontamination under m-immunity
We consider the problem of decontaminating an infected network using as few mobile cleaning agents as possible and avoiding recontamination. After a cleaning agent has left a vertex v, this vertex will become recontaminated if m or more of its neighbours are infected, where m ≥ 1 is a threshold parameter of the system indicating the local immunity level of the network. This network decontaminat...
متن کاملMicrobial Safety of Black Summer Truffle Collected from Sicily and Umbria Regions, Italy
Background: Tuber aestivum Vittad., known as black summer truffle, represents high-value food especially used as garnishment in nouvelle cuisine. The aim of this study was to investigate on the viable microbial populations associated with T. aestivum ascomata collected in different sites of Sicily and one locality of Umbria (Italy). Methods: The ripe ascomata of black summer truffles were coll...
متن کاملStrategies to Overcome Network Congestion in Infrastructure Systems
Networked Infrastructure systems deliver services and/or products from point to point along the network. Demand for the services provided by such systems is typically cyclic, creating inefficiencies in capacity utilization. Congestion pricing provides incentives to shift demand from peak time periods to lower demand periods. This effectively increases the capacity of the system without the need...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2017